Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 11:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe
-
Size
509KB
-
MD5
204f9f355c396170f187ffc7091f2224
-
SHA1
62d2f15b10a9173148fc979d233110dd2c2f5289
-
SHA256
abd8a353aae6c85dc61384478bdf6e7c8d273f55b8e424287a495022718f318a
-
SHA512
2b16af242075f35b958e0196875b8f6803454126f03ff0ce2d37afec72b401b657d42bf1414ee1e2554f44e28966e162bd0143adf4f6d3b2a7b1853cd68b5372
-
SSDEEP
6144:hGxhLyIIr7vfEMq2erzNAbDvlvvY5Q+Ug0ndtZdHfvywOmb1XjCLMHkUF:AKP/f7fer4DNvvYpz0n7ZYwOmZXjCL/
Malware Config
Extracted
xloader
2.5
cuig
sofiathinks-elderly.net
lahamicoast.info
2shengman.com
cbsautoplex.com
arcana-candles.com
genrage.com
kukumiou.xyz
thequizerking.com
sonataproductions.com
rebuildgomnmf.xyz
ubcoin.store
yiyouxue.net
firstlifehome.com
mdx-inc.net
gotbn-c01.com
dinobrindes.store
jcm-iso.com
cliente-mais.com
mloujewelry.com
correoversoi.quest
rc-rental-housing.com
swisstrustcitybank.com
traderjoes-corp.com
mandolinmeditations.com
kathcorp.com
mcdonaldsfastdel.xyz
nielsqanalytics.com
bansity.com
mimosymas.com
atp-cayenne.com
sinterekes.com
nnxsk.com
shushigallery.tech
thgn41.xyz
resporn.tech
growingki.com
themyopiatoolbox.com
angeleyesevents.com
reddishgomjtd.xyz
amazonretailbrickandmotar.net
jewelrybyjma.com
ctroutdoors.pro
357961.com
theakfam.business
skincarefamily.com
xptoempeendimentos.com
tapestrirewards.com
viridilodge.com
bostondowntownrealestate.com
disrepairclaimsuk.com
makaroff.net
thedoublezbar.com
barbicidemalaysia.com
sliv-a.online
showgeini.com
martialartsreigns.online
metamode.space
ch95516.ink
halvorson-pickup.com
mizuno-trouble.net
46dgj.xyz
esylf4vt.xyz
chopaap.com
igorleonardo.com
qtih.top
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/1232-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1568 set thread context of 1232 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe 1232 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1232 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe 31 PID 1568 wrote to memory of 1232 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe 31 PID 1568 wrote to memory of 1232 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe 31 PID 1568 wrote to memory of 1232 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe 31 PID 1568 wrote to memory of 1232 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe 31 PID 1568 wrote to memory of 1232 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe 31 PID 1568 wrote to memory of 1232 1568 JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_204f9f355c396170f187ffc7091f2224.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232
-